EP4050502B1 - Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks - Google Patents
Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerksInfo
- Publication number
- EP4050502B1 EP4050502B1 EP22168075.4A EP22168075A EP4050502B1 EP 4050502 B1 EP4050502 B1 EP 4050502B1 EP 22168075 A EP22168075 A EP 22168075A EP 4050502 B1 EP4050502 B1 EP 4050502B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- unit
- units
- communication
- transportation network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B61—RAILWAYS
- B61L—GUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
- B61L15/00—Indicators provided on the vehicle or train for signalling purposes
- B61L15/0018—Communication with or on the vehicle or train
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Definitions
- the present invention generally relates to the fields of cybersecurity and, of Information Technology (IT) and Operational Technology (OT) network security. More specifically, the present invention relates to methods, systems, devices, circuits and functionally related machine executable instructions for cybersecurity of transportation management networks, such as, but not limited to, PTC (Positive Train Control) and/or ETCS (European Train Control System) railway signaling systems.
- transportation management networks such as, but not limited to, PTC (Positive Train Control) and/or ETCS (European Train Control System) railway signaling systems.
- the OT environment is no longer considered to be a closed network, meaning, from now on any component in the OT network has the ability to be hacked and manipulated in a way which could cause serious damage to the railway operation.
- the signaling technology includes electronic interlocking, radio/cellular-based signaling systems, such as the European Train Control System (ERTMS) and the Positive Train Control systems (PTC), and designated mobile-radio standards to which hackers cannot simply gain access.
- ERTMS European Train Control System
- PTC Positive Train Control systems
- the document WO 2008/100148 A2 discloses a date handling system for controlling a configuration of support software products for monitoring and managing a complex system.
- the document " A Formal Approach to Designing Reliable Advisory Systems” from Martin Luke (ISBN: 978-3-540-74549-5 ) discloses a method in which to formally specify the design and reliability criteria of an advisory system for use within mission-critical contexts.
- Embodiments of the present invention include methods, systems, devices, circuits and functionally related machine executable instructions for transportation management network cybersecurity.
- a set of one or more agents coupled to respective transportation management network units, adapted to each collect and relay signals/data-streams indicative of the units' recent activity and/or recent/current operation state (s) /status (es) .
- a behavior monitoring server may receive - from some or all of the set of transportation management network agents - and store, the signals/data-streams indicating their respective activity and/or status(es).
- a unit policy generation module/server may generate expected behavior policy(ies)/profile(s) for at least some of the transportation management network units - based on the signals/data-streams received by the behavior monitoring server and/or based on data, from one or more resources, indicative of the transportation network's activity.
- a generated policy may be relayed-to/shared- with its respective agent and optionally with one or more other agents of the transportation management network, associated with the policy-generated/profiled unit.
- cyber-event detection logics - each associated with a system unit monitoring agent - may compare one or more of the relayed unit policies to actual/current/real-time behavior of the same network units, and may associate a potential malicious activity, malware or cyber event - with one or more anomalies or mismatches detected between, a network unit behavioral policy and the actual/current/real-time behavior of the same profiled network unit.
- transportation management network units monitored by system agents may include, but are not limited to, any combination of: a control center, radio block control units, network car/locomotive onboard units; and/or network wayside units.
- system'agents' may take the form of, or be implemented as: a software agent/application; a dedicated function embedded system; a system on chip (SoC); a multi-function processor, processing-unit, computer or server; and/or any software and/or hardware combination of the above listed sy stem/ component/module types.
- SoC system on chip
- Some embodiments of the invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment including both hardware and software elements.
- Some embodiments may be implemented in software, which includes but is not limited to firmware, resident software, microcode, or the like.
- some embodiments of the invention may take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
- a computer-usable or computer-readable medium may be or may include any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device, for example a computerized device running a web-browser.
- the medium may be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- a computer-readable medium may include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk, and an optical disk.
- optical disks include compact disk - read only memory (CD-ROM), compact disk - read/write (CD-R/W), and DVD.
- a data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements, for example, through a system bus.
- the memory elements may include, for example, local memory employed during actual execution of the program code, bulk storage, and cache memories which may provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
- the memory elements may, for example, at least partially include memory/registration elements on the user device itself.
- I/O devices including but not limited to keyboards, displays, pointing devices, etc.
- I/O controllers may be coupled to the system either directly or through intervening I/O controllers.
- network adapters may be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices, for example, through intervening private or public networks.
- modems, cable modems and Ethernet cards are demonstrative examples of types of network adapters. Other suitable components may be used.
- Embodiments of the present invention include methods, systems, devices, circuits and functionally related machine executable instructions for transportation management network cybersecurity.
- a set of one or more agents coupled to respective transportation management network units, adapted to each collect and relay signals/data-streams indicative of the units' recent activity and/or recent/current operation state (s) /status (es) .
- a behavior monitoring server may receive - from some or all of the set of transportation management network agents - and store, the signals/data-streams indicating their respective activity and/or status(es).
- a unit policy generation module/server may generate expected behavior policy(ies)/profile(s) for at least some of the transportation management network units - based on the signals/data-streams received by the behavior monitoring server and/or based on data, from one or more resources, indicative of the transportation network's activity.
- a generated policy may be relayed-to/shared- with its respective agent and optionally with one or more other agents of the transportation management network, associated with the policy-generated/profiled unit.
- cyber-event detection logics - each associated with a system unit monitoring agent - may compare one or more of the relayed unit policies to actual/current/real-time behavior of the same network units, and may associate a potential malicious activity, malware or cyber event - with one or more anomalies or mismatches detected between, a network unit behavioral policy and the actual/current/real-time behavior of the same profiled network unit.
- transportation management network units monitored by system agents may include, but are not limited to, any combination of: a control center, interlocking (IXL) units, radio block control units, network car/locomotive onboard units; and/or network wayside units.
- IXL interlocking
- system'agents' may take the form of, or be implemented as: a software agent/application, a dedicated function embedded system, a system on chip (SoC), a multi-function computer or server and/or any software and/or hardware including combination of the above listed computing system/component types, or any computing system/component type to be devised in the future.
- SoC system on chip
- the cybersecurity agents described in any of the embodiments herein may use deep-packet inspection for network packets to detect malicious activity or exploits - such as protocol vulnerabilities, operating system vulnerabilities and more.
- one or more agent/client components of a system for cybersecurity of a transportation signaling/management network may be functionally associated with corresponding units of the transportation signaling/management network.
- transportation signaling/management network data resources such as a train management and scheduling information, may be utilized to generate operational and informational policies for some or all of the signaling network's units.
- the operational and informational functionality characteristics of the transportation signaling/management network units may be monitored. Collected, units' functionality characteristics data may be processed to generate operational and informational policies for some or all of the signaling network's units.
- Signaling network units' functionality characteristics data may, for example, include: Operation Technology (OT) data - e.g. intermittent operational statuses of units; and/or, lnfor-mation Technology (1T) data - e.g. data transfer parameters of units' communications and/or data content parameters collected from within units' communications.
- OT Operation Technology
- (1T) data e.g. data transfer parameters of units' communications and/or data content parameters collected from within units' communications.
- the control center of the transportation signaling/management network - a computer-based command and control - may send commands, to OT (Operation Technology) equipment/elements/devices, such as signal heads and point machines.
- OT Operation Technology
- a'green light' command from the control center computer to an embedded signal head device of a transportation network unit.
- cybersecurity system agents may be functionally associated with, and monitoring/listening-to real time communication of, the signaling network units.
- Real time communication characteristics and content, of a given unit may be compared - by an event detection server of the cybersecurity system and/or by event detection logics of the specific system agents - to the operational and informational policy generated for that specific signaling network unit.
- a cyberevent detection may be determined.
- the system may: issue notifications to signaling network systems and/or personal; issue direct operational commands to controllers of specific units of the signaling networks (e.g. sideway units); and/or trigger the execution of additional detection verification processes, for example, real time comparison to additional policy segments may be executed, and/or the system may check if the detected cyber-event is specific to one specific unit/equipment (on which it was first detected) or is the event entire system, or system sector, wide.
- additional detection verification processes for example, real time comparison to additional policy segments may be executed, and/or the system may check if the detected cyber-event is specific to one specific unit/equipment (on which it was first detected) or is the event entire system, or system sector, wide.
- FIG 1 a topology of an exemplary system for cybersecurity of transportation management networks, including the main units of the transportation management network and the components/agents of the cybersecurity system functionally associated therewith.
- railway signaling system units including: (1) a Control Center, including a combination of: an Operation Management Center (OMC). a Back Officer Server (BOS), a Train Management System (TMS), and/or any additional Components in charge of controlling and operating the units and components (e.g. critical endpoints) in the signaling system; (2) an Interlocking (IXL) Unit; (3) a Radio Block Control (RBC), communicating with and relaying commands to, and information from: (4) a Vehicle On-Board Controller (V OBC) / Locomotive On-Board Unit (OBU) and (5) a Wayside Unit, or any device, optionally having computer processing and code execution abilities, positioned next to or on the railroad (e.g. balise, gate, traffic light).
- OBC Operation Management Center
- BOS Back Officer Server
- TMS Train Management System
- IXL Interlocking
- RBC Radio Block Control
- V OBC Vehicle On-Board Controller
- OBU Locomotive On-Board Unit
- Shown cybersecurity system components and agents include: (1) a Cybersecurity System Server(s) (CSS) for monitoring railway control center activity and/or for analyzing agents collected data in order to generate policies and detect cyber threats in the signaling system network; (2) an Interlocking Unit Agent; (3) a Cybersecurity Radio Block Controls (RBC) Agent; (4) a Cybersecurity On Board Unit (OBU) Agent; and (5) a Cybersecurity Wayside Unit Agent.
- CCS Cybersecurity System Server
- RBC Cybersecurity Radio Block Controls
- OBU Cybersecurity On Board Unit
- Each of the cybersecurity agents - CSS, RBC, OBU and Wayside Unit monitors the communication characteristics and content, of its respective signaling network unit, and relays the collected data to the Cyber security System Server(s).
- the Cybersecurity System Server(s), and/or any additional or other system server(s), monitors the communication characteristics and content of the signaling network Railway Control Center, for policy generation purposes and/or for alert detection based on comparison to later collected real time Railway Control Center data.
- a railway signaling system - used to control railway traffic, to prevent trains from colliding and to adjust distance and the speed for proper braking time and management of tracks - may include four main critical components: on-board units, wayside units, RBCs (Radio Block Controls) and BOS (Back Office Server) / Control centers. These components may be communicatively connected using wired or wireless communication and may be vulnerable to many different vectors of cyber-attacks.
- RBCs Radio Block Controls
- BOS Back Office Server
- system agent components may be installed-onto/functionally-associated-with some or all of the units of the railway signaling system and may secure critical assets by analyzing the traffic and communication between the different, or similar, assets to detect, and optionally to classify and/or provide remedies for, cyber threats in the signaling network.
- FIG 2A a schematic layout of an exemplary system for cybersecurity of transportation management networks, including the main units of the transportation management network and the agent components and server modules of the cybersecurity system functionally associated therewith, wherein the communication between the agent components and server modules of the cybersecurity system is performed over a separate/distinct network of communication channels that is independent of the transportation management signaling network.
- cybersecurity system agents are shown to be monitoring respective railway signaling network units.
- Unit functionality characteristics data, collected by each of the agents is relayed to a unit behavior monitoring server, receiving information from all deploy ed/active cybersecurity system agents.
- a Policy generation and updating server utilizes agents collected data from the behavior monitoring server, and/or one or more railway network related data resources (e.g. published train scheduling data), to generate and update operational and informational/communicational policies for the signaling network units.
- Real time, or substantially real time, units functionally characteristics data is intermittently received and relayed by the behavior monitoring server to a cyber-event detection server, to be compared to signaling network units policies, of units from which real time data has been received.
- a notification(s), an alert, a detected cyber-event classification process and/or the relaying of one or more operational commands to signaling network unit(s) associated with the determined cyber-event - may be triggered in response to a detected cyber event.
- communication channels between the signaling network railway control center and the signaling network units are shown in broken lines. Communications to/from the railway control center are relayed to one of the two RBCs shown - Ist RBC and 2nd RBC - and from/to each of the two RBCs to a respective set of signaling network units associated therewith.
- Communications between the cybersecurity system agents and the behavior monitoring server of the system - and between the behavior monitoring, policy generation and cyber-event detection servers of the system - are conducted over a separate communication network having a different set of communication channels, shown in full lines.
- Communications from the policy dispatch server, relaying generated signaling network unit policies and policy updates to corresponding unit agents - are likewise conducted over a separate communication network (from the signaling network) having a different set of communication channels - which separate network may or may not be the same network used by the cybersecurity system agents and servers.
- Unit policy dispatch/distribution channels are shown dotted lines.
- FIG 2B a schematic layout of an exemplary system for cybersecurity of transportation management networks, including the main units of the transportation management network and the agent components and server modules of the cybersecurity system functionally associated therewith, wherein the communication between the agent components and server modules of the cybersecurity system is performed over a communication channels of the transportation management signaling network.
- Communications between the cybersecurity system agents and the behavior monitoring server of the system - and optionally between the behavior monitoring, policy generation and cyber-event detection servers of the system - are conducted over the communication channels of the transportation management signaling network, sharing channels/bandwidth with communications between the signaling network railway control center and the signaling network units - all of which communication channels are shown in the figure in full lines.
- a control center - in charge of controlling and operating the critical assets in the signaling system - may include two main parts: one or more dispatch centers for relaying operation instructions to the units/assets of the signaling system and/or for receiving operational status related information from them; and, a user interface that enables users/administrators access, control and operation of the signaling assets and the CB1 (Computer-Based interlocking) system, of the BOS / OMC (Operation Management Center), that manages the safety of the signaling system.
- CB1 Computer-Based interlocking
- System unit(s), implementing a cybersecurity solution may be installed-onto/functionally- associated-with/implemented-in the BOS/OMC (control center) and may analyze the incoming and outgoing communication to detect cyber threats in the signaling system.
- BOS/OMC control center
- FIG 3 a schematic layout of the main parts of a railway control center and the components and server modules, of an exemplary cybersecurity system, functionally associated with the railway control center.
- a wireless antenna e.g. GSM-R, GSM, Tetra, or any wireless channel
- a cybersecurity system agent monitoring control center communications to detect cyber-events
- a network gateway through which control center communications are sent and received
- a railway control center e.g. Railway Operation Management Center (OMC)/ Back Officer Server (BOS)/ Train Management System (TMS)/ and/or Server - Components in charge of controlling and operating the units of, and critical endpoints in, the signaling network
- OMC Railway Operation Management Center
- BOS Back Officer Server
- TMS Train Management System
- Server Components in charge of controlling and operating the units of, and critical endpoints in, the signaling network
- Cyber security system server which analyzes data from different resources/system-agents (e.g.
- Dispatch centers also known as control centers responsible for operating all of the operational units/assets in the signaling network.
- wayside units may include parts of the signaling system that connect various wayside equipment types to the signaling network.
- Wayside equipment types may for example include: signals, switches, and/or control devices for railroad operations, which are located on, along and/or in proximity to the railroad tracks.
- the wayside units may receive commands from the signaling network (e.g. from the control/operation center) and transmit data back to the network.
- wayside balises may connect to the network through wayside units and receive speed limits, which they then send to a corresponding train when it passes the balise.
- System agents implementing a cybersecurity solution, may be installed-onto/functionally-associated-with/implemented- in/connect-to the wayside unit and processes the incoming and outgoing data to secure and ensure validity and to understand the integrity of each command, based on the policies and profiles it received from the cybersecurity system server.
- FIG 4 a schematic layout of the main parts of a railway wayside unit and the components, of an exemplary cybersecurity system, functionally associated with the wayside unit.
- a Wayside unit equipment any device on/next-to/in-proximity-of the railroad tracks, e.g. balises, signal head, point machine); Rail cars or locomotives; Rail tracks; a Computer unit or module connecting the wayside equipment unit with the signaling network; a cybersecurity system agent for monitoring wayside unit communications (e.g. traffic) and comparing , or relaying for server comparison, real-time network behavior characteristics (e.g. communication traffic) to policy -based, estimated/determined/predicted network behavior characteristics (e.g.
- comparison process mismatch(es) may be utilized to detect anomalies or malicious activities inside the signaling network and alert/notify on a cyber-event (e.g. attack); a Signaling systems computer module - such as PTC, ETCS, CBTC, or any other signaling system type; and a GPS, or any other location device, for locating an indicating the position of the wayside unit, within the railway signaling system.
- a cyber-event e.g. attack
- a Signaling systems computer module - such as PTC, ETCS, CBTC, or any other signaling system type
- GPS or any other location device, for locating an indicating the position of the wayside unit, within the railway signaling system.
- wayside units may collect data and transmit it to: a control center, an RBC and/or to onboard units (e.g. by eurobalises).
- the onboard units may each consist of several parts, including: an onboard computer that monitors and calculates the maximum speed and the breaking curve of the train; and the onboard unit that connects to the signaling network and receives data from the different wayside units and the control center, thereby connecting the wayside equipment to the signaling network.
- Wayside equipment - the signals, switches, and/or control devices for railroad operations located along the railroad tracks - may receive commands from the signaling network (e.g. the control/operation center) and transmit data back to the network.
- balises may connect to the network and receive speed limits, which they may then send to the train passing when it passes the balise.
- the cybersecurity system onboard agent connects to the onboard unit and processes the incoming and outgoing data to secure and ensure validity and to understand the integrity of each command, based on the policies and profiles it received from the cybersecurity system server.
- a given onboard computer may continuously/intermittently monitor and calculate the maximum speed and the braking curve of the train, wherein a respective cybersecurity system onboard unit may processes at least some of the incoming and outgoing data.
- FIG 5 a schematic layout of the main parts of a railway onboard unit (OBU) and the components, of an exemplary cybersecurity system, functionally associated with the onboard unit.
- OBU railway onboard unit
- a GPS or any other localization device a wireless antenna, for example, based on cellular transmitter and receiver (e.g. GSM-R, GSM, LTE, Tetra, or any wireless channel); an on-board control unit; a cybersecurity system agent; a railroad cars or a locomotives; communication system that transfers railway/train computer data, internally, between train cars and components; a PTC (positive train control)/ ETCS (European Train Control System) system/ CBTC (Communications-based train control) or a similar railway protocol communication modules; and an onboard system computer.
- a Radio Block Control (RBC) unit/device in the signaling network may act as a centralized safety unit which, using radio connection (e.g. GSM-R, GSM, LTE, Tetra, or any wireless channel), may receive train position information and may, in response, send movement authorization and further information required by the train for its movement.
- the RBC may interact with the different components in the signaling network to obtain signaling-related information, route status, etc. It may also manage the transmission of selected trackside data and communicate with other/adjacent/neighboring RBCs.
- FIG 6 a schematic layout of the main parts of a railway radio block control (RBC) and the components, of an exemplary cybersecurity system, functionally associated with the radio block control.
- RBC railway radio block control
- a Radio Block Controller (RBC) computer unit or module connected to the signaling network a Radio Block Controller (RBC) computer unit or module connected to the signaling network; a cybersecurity system agent that compares the real-time network traffic to the estimated network traffic to/from the RBC - wherein detected'real-time traffic' to'estimated traffic' mismatches indicate anomalies or malicious activities inside the network and may trigger an alert; RBC module for wireless communication, for example radio reception and transmission circuitry; an antenna for wireless communication; an RBC module for wired communication; a signaling systems computer and communication module - such as a PTC, an ETCS, a CBTC, or a similar railway protocol communication module, of any other signaling system type; an interlocking system that manages different units/assets in the signaling system and thus ensures the safety of the trains; an asset/unit in the signaling system (e.g. a point machine, headlight or any unit in the signaling network); Rail cars or a locomotives; and a railroad car or a locomotive module
- a system for providing cybersecurity to a railway operational system may implement a method/solution combining two main parts - a server and one or more agents/clients.
- the server may - based on received and/or collected information from multiple resources (e.g. scheduling systems, train management systems) and/or based on the monitoring of normal/typical functionality of signaling network units - calculate the estimated behaviors for one or more components/units in the signaling network.
- the system server(s) may generate policies, for both the network (i.e. information, communication) related functionality and/or the operation functionality, for each or some of the different signaling network units.
- Generated policies may be sent to corresponding field cybersecurity system agents/clients.
- Each system agent/client may then compare real-time information/communication traffic and operational behavior of the unit it monitors - to its respective policy received. The comparison enables the detection of abnormal or malicious behavior, based on detected comparison mismatches between the real time traffic and behavior of a given signaling network unit and its policy estimated traffic and behavior.
- the following, are descriptions, system dataflow diagram and method flowchart, of an exemplary policy generation process, in accordance with some embodiments.
- policies may include both operation policies and network policies.
- the operation policy may include: (1) the expected operational (e.g. mechanical) behavior of the unit/element (e.g. times when a specific light should change to red/green), based on data from various systems such as unit behavior monitoring agents and/or resources data (e.g. scheduling data); and (2) the network policy may include: the expected network behavior of each unit/element (e.g. when it receives network packets, using what protocol and from what source) .
- data publishing and/or data resource access enabling servers and databases may be regarded as monitored transportation control signaling network units. Based on the profiling of data and/or data publishing behavior of a given data resource, as monitored by a cybersecurity system behavior monitoring server or agent, one or more activity policy regulations or conditions - for other/downstream signaling network control/management units - may be generated.
- signaling network units' policies, of a first set of one or more units may be at least partially generated based on the monitored behavior of a second set of one or more other signaling network units, wherein the second set of units may include data resource(s) - publishing, broadcasting, multicasting and/or allowing access to - data indicative of the operational or communicational activity of one or more units in the first set of units.
- publishing and/or accessible data resources regarded as monitored transportation control signaling network units may for example include, but are not limited to: Transportation scheduling data resources, of the transportation network or of one or more other transportation networks at least partially coordinated therewith; train management system (TMS) data; 'Smart/Safe City' systems data; present/immediate cyber and malicious activity threats repositories; localization and navigation platforms'/system's data resources; and/or any other data resources publishing or allowing access to the behavior of the transportation network and units/elements thereof.
- TMS train management system
- communications sent to/from transportation control units may be filtered or flagged by an artificial intelligence node monitoring various signals and/or data streams associated with functional points and units of the transportation network, wherein the functional points and units may at least partially include publishing and/or accessible data resources regarded as transportation control signaling network units.
- the artificial intelligence node may include a neural network, wherein the neural network may be trained using signals and/or data streams - associated with functional points and units of the transportation network - which were collected during units' previous operation times in which no cyber or malicious events occurred.
- the unit policies may combine to collectively create a solution for both OT related and 1T related protection. These policies may be regularly updated and resent to the corresponding different cybersecurity agents in the field. Based on the policies, the integrity of the system may be determined and cyber threats in the network may be detected substantially in real-time.
- a cyber event/threat may be classified at (i.e. as part of), or following to, its detection.
- the cybersecurity system server may: use the event/threat classification for referencing an event/threat remedies database and selecting a matching solution; and/or generate a custom event/threat remedy for the detected event/threat based on its specific characteristics.
- the selected remedy/solution may: prevent the cyber-attack attempt, produce a recommendation on how to solve it or minimize its effect, protect specific system components or assets and/or isolate the threat to limit its damage/spreading. For example, if a specific device/unit overloads the network (e.g. denial of service) and sends a lot of traffic, the recommendation may be to disconnect it from the network to avoid damage or connection losses to other units or network elements.
- FIG 7A a dataflow diagram of an exemplary dataflow between transportation management network information resources, the cybersecurity system server and transportation management network units - as part of the generation of profiles and policies, and their propagation to respective transportation management network units.
- the following exemplary data resources are shown: (1) a Train Management System (TMS) for integrated management and monitoring of suburban train movements and signaling, as well as planning train routes, diversions, and introduction or withdrawal of rakes in service or any railway information management; this is used to receive initial and/or updated information about each train in the railway network; (2) a Train scheduling system - including, for example, General Transit Feed Specification (GTFS) which is a common format for public transportation schedules and associated geographic information - or any railway/transportation schedule information; and/or (3) Any other resource containing signaling network units functionality/operation indicative information, that may be analyzed to derive unit policy data, for example, a maintenance information repository/database may be used to anticipate"unexpected" commands to the signaling system; further shown is (4) a cybersecurity system server that collects information from the different resources and creates unique policies for different units/assets in the signaling system network (e.g. for: point machines, RBCs, onboard units); and (5) the unique policies generated, or updates thereof,
- FIG 7B a flowchart of the main steps of an exemplary method for the generation of profiles and policies, for transportation management network units, based on scheduling information.
- policies created utilizing the exemplified method are then sent to their corresponding field cybersecurity agents/devices, that compare the'real-time traffic/operation' (of each of their respectively monitored signaling network unit) to the 'estimated traffic/operation', as expressed/defined/described in its policy, for detecting abnormal behavior.
- the flowchart method, or an algorithm based thereof calculates: the estimated time(s) of communication between the signaling network units/assets (e.g. train no. 1 will communicate with [will also pass over] eurobalis no. 2 at 12:30); and their estimated operation status at specific time points and/or during specific time periods/segments (e.g. switch is left/right now, light will be green/red for the following hour).
- Cybersecurity system server receives the scheduling information (e.g. from the Train Management System) or any other scheduling system; (2) The server calculates the estimated time for each communication between a train and a wayside units (or any other unit/asset in the signaling system); (3) The server calculates the estimated time for each communication between a wayside unit and a train (or any other unit/asset in the signaling system); (4) The server calculates the estimated time for each communication between a wayside unit and, another wayside unit or a control center (or any other critical unit/asset in the signaling system); (5) The server calculates the estimated time for each communication between a wayside unit and another wayside unit or an RBC (or any other critical unit/asset in the signaling system); (6) The server calculates the estimated time for each communication between a control center and, a wayside unit or an RBC (or any other critical unit/asset in the signaling system); (7) The server calculates the estimated operation state/status, per time point/peri
- FIG 8 there is shown, in accordance with some embodiments of the present invention, a flowchart of the main steps of an exemplary method for the processing of packets communicated over a signaling system of a transportation management network, as part of the detection of malicious activity.
- figure 9 there is shown, in accordance with some embodiments of the present invention, a flowchart of the main steps of an exemplary method for the validation, and data anomaly detection, of packets communicated over a signaling network of a transportation management system, as part of the detection of malicious activity.
- step (4) of figure 8 Initiate the algorithm (step (4) of figure 8 ) to detect malicious activity in the signaling system; (2) Check if (search for) any part of the parsed-packet/extracted- command exists in a blacklist; (3) Check if the metadata is suspected as malicious activity, for example, in the form of network protocol vulnerability exploits detected in the metadata (e.g.
- step 2 and/or of step 5 is positive; and/or if the output to steps 3, 4 and/or 6 is negative - than (8A) return'NO' - a suspicious behavior has been detected, generate/provide alert(s)/notification(s); else, (8B) return'YES' - the packet is considered safe, return (not suspicious behavior / cyber threat).
- an exemplary Light Configuration based network data validation may, for example, include a cybersecurity system agent/element monitoring/listening-to communications relayed (e.g. by one or more of the signaling network's RBCs (Radio Block Control) and/or its BOS (Back Office Server) / Control Center) to a specific railway network wayside light.
- Rail- control protocol layer data packets, in the monitored communication may be parsed to extract commands arriving at the railway network wayside light and analyzed to understand specific commands that were sent.
- the analyzed command may be compared to a pre generated operation profile/policy of the same railway network wayside light, wherein a mismatch between the expected command at the current time, as defined by the operation profile/policy, and the actual received command, may trigger an alert.
- a'change the light to green' command, received by the railway network wayside light, at a time point/period when the profile/policy indicates the light should be/remain green may indicate a potentially invalid command that may be associated with a cybersecurity related event.
- a responsive action may include the triggering of an alert or alert notification(s) and/or the aborting/ignoring/changing of the received command (i.e. light remains red).
- an alert and/or a command abortion, related to a specific wayside element/agent may be triggered based on a profile/policy to command mismatch of the specific wayside element/agent and/or based on a profile/policy to command mismatch of another/other wayside element/agent.
- a'change the light to green' command may be aborted based on its mismatch to the profile/policy of the designated light; and/or based on its mismatch with the policy of another wayside element/agent.
- the profile/policy of another wayside light - of a railway track intersecting with the track of the command designated light - may indicate that the light will be green for a following period of time. Executing the received command may thus cause both lights, of the two intersecting tracks, to be simultaneously green, which may result in a collision between trains riding over these two tracks.
- FIG 10A there is shown, in accordance with some embodiments of the present invention, a flowchart of the main steps of a first exemplary validation process, wherein traffic light configuration commands, within packets communicated over a signaling system of a transportation management network, are utilized to validate the packets.
- an exemplary'Wayside unit' (e.g. Balise) to On Board Unit' Communication based network data validation may, for example, include a system agent/element monitoring/listening-to communications between a specific train's OBU and a specific balise. Based on a pre-generated functionality/operational policy of the specific train, it is known that the train is supposed to pass over the specific balise at a specific expected point in time, or within a specific time period; and to receive specific information from the balise (e.g. a speed change instruction).
- specific information from the balise e.g. a speed change instruction
- a cybersecurity system's agent monitoring the specific train's OBU communications (or the specific balise' s communications) may, based on the pre-generated functionality/operational OBU/Wayside policy, expect an On Board Unit' to'Wayside unit' communication at a particular time (i.e. train crossing balise time), which communication is expected to include specific information (e.g. a speed change instruction).
- specific information e.g. a speed change instruction
- a responsive action may, for example, include the triggering of an alert or alert notification(s) and/or the issuing of a balise to OBU command (or a direct OBU command) - based on the balise policy expected, but not sent, command to the OBU (e.g. lower your speed to 60 km/h).
- FIG 10B there is shown, in accordance with some embodiments of the present invention, a flowchart of the main steps of a second exemplary validation process, wherein on-board to balise communication time and data, of /within packets communicated over a signaling system of a transportation management network, are utilized to validate the packets.
- an exemplary Network Metadata based network data validation may, for example, include system agents/elements monitoring/listening-to communications between the control center of the railway operation system signaling network and a specific set of Wayside units. Based on a specific bandwidth(s) allocation/usage - general, or at a specifically selected time point(s)/period(s)/interval(s) - as defined by a pre-generated policy(ies) of the control center or wayside units, a deviation(s) from the expected communication bandwidth may be detected.
- a responsive action - to an unexpected bandwidth deviation, or an abnormal (from what is defined in the policy) bandwidth may, for example, include the triggering of an alert or alert notification(s).
- FIG 10C there is shown, in accordance with some embodiments of the present invention, a flowchart of the main steps of a third exemplary validation process, wherein network metadata, relating to wayside units communication bandwidth characteristics, is utilized to validate packets, communicated over a signaling system of a transportation management network.
- network metadata relating to wayside units communication bandwidth characteristics
- an exemplary - Unexpected network behavior - based network data validation may, for example, include system agents/elements monitoring/listening-to wayside units' communications. Based on a set of expected IP addresses, or other communication network source addresses, from which a specific wayside unit, or any given wayside unit, should receive communications - as defined in its/their pre-generated policy - an IP address, or network source address (not listed in the policy), from which a wayside unit targeted communication has been received/monitored, may trigger a malicious activi-ty/access attempt.
- a responsive action - to an unexpected source address communication may, for example, include the triggering of an alert or alert notification(s); and/or the issuance of instructions to ignore (i.e. not execute) commands associated-with/arriving from - unknown/not-in-policy source addresses (e.g. IP addresses).
- - unknown/not-in-policy source addresses e.g. IP addresses
- FIG 10D there is shown, in accordance with some embodiments of the present invention, a flowchart of the main steps of a fourth exemplary validation process, wherein network behavior, relating to the source addresses of wayside units' received communications, is utilized to validate packets, communicated over a signaling network of a transportation management system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Mechanical Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Claims (13)
- Ein Schienenverkehrsnetz, umfassend:mindestens eine Netzsteuerungseinheit, die sich an einem Funktionspunkt des Netzes befindet und dazu ausgelegt ist, eine Konfiguration des Funktionspunkts des Netzes als Reaktion auf den Empfang einer oder mehrerer Mitteilungen von anderen Einheiten des Netzes zu ändern; undAgenten, die jeweils funktional mit einer der mindestens einen Netzsteuerungseinheit gekoppelt und dazu ausgelegt sind, an die mindestens eine Steuerungseinheit gesendete Mitteilungen zu filtern oder zu kennzeichnen, dadurch gekennzeichnet, dass jeder der Agenten gemäß einer jeweiligen Steuereinheit-Richtliniendatei arbeitet, die von einem künstlichen Intelligenzknoten generiert wird, der verschiedene Funktionspunkte und Einheiten des Verkehrsnetzes überwacht, wobei die Agenten auch Informationen zum Verhalten der Einheit an einen Verhaltensüberwachungsserver übermitteln, wobei die übermittelten Informationen zum Verhalten der Einheit mindestens ein Ergebnis eines Vergleichs zwischen einer Kommunikationsvorschrift der Einheit in der von dem künstlichen Intelligenzknoten generierten Einheitsrichtliniendatei und dem in Echtzeit überwachten Kommunikationsverhalten dieser Einheit umfassen.
- Das Schienenverkehrsnetz gemäß Anspruch 1, wobei der künstliche Intelligenzknoten die Einheitenrichtliniendateien auf der Grundlage einer weiteren Überwachung von Funktionspunkten oder von alten und neuen Einheiten des Verkehrsnetzes ständig aktualisiert.
- Das Verkehrsnetz gemäß Anspruch 1, wobei die Agenten auch dazu dienen, ihre jeweiligen Verwaltungseinheiten vor einer bestimmten Kommunikation zu schützen, wenn bei einem Vergleich zwischen einer oder mehreren Eigenschaften der bestimmten Kommunikation und einer oder mehreren Kommunikationsvorschriften der Zieleinheit, an die die bestimmte Kommunikation gesendet wurde, wie in der von dem künstlichen Intelligenzknoten generierten Einheitsrichtliniendatei angegeben, eine Nichtübereinstimmung festgestellt wird.
- Das Verkehrsnetz nach Anspruch 3, wobei die eine oder mehreren verglichenen Merkmale der gegebenen Kommunikation Folgendes umfassen: (1) den Sendezeitpunkt der Kommunikation, (2) den Ankunftszeitpunkt der Kommunikation oder (3) spezifische Daten, die als Teil der Kommunikation gesendet werden.
- Das Verkehrsnetz nach Anspruch 3, wobei die genannten Agenten so agieren, dass sie ihre jeweiligen Verwaltungseinheiten vor der gegebenen Kommunikation schützen, indem sie deren Ankunft bei der/den Verwaltungseinheit(en) verhindern.
- Das Verkehrsnetz nach Anspruch 3, wobei die genannten Agenten so agieren, dass sie ihre jeweiligen Verwaltungseinheiten vor der gegebenen Kommunikation schützen, indem sie deren Ankunft oder bevorstehende Ankunft bei der/den Verwal-tungseinheit(en) melden.
- Das Verkehrsnetz nach Anspruch 1, wobei die Trainingsdaten für den künstlichen Intelligenz-Knoten, der die Steuerungseinheits-Richtliniendatei generiert, zumindest teilweise Signale oder Datenströme umfassen, die von Funktionspunkten und Einheiten des Verkehrsnetzwerks während früherer Betriebszeiten des Verkehrsnetzwerks gesammelt wurden, bei denen keine Cyber- oder böswilligen Ereignisse festgestellt wurden.
- Verfahren zum Verwalten eines Schienenverkehrsnetzes gemäß Anspruch 1, wobei das Verfahren umfasst:Anordnen mindestens einer Netzsteuerungseinheit an einem Funktionspunkt des Netzes, wobei die Netzsteuerungseinheit so ausgelegt ist, dass sie eine Konfiguration des Funktionspunkts des Netzes als Reaktion auf den Empfang einer oder mehrerer Kommunikationen von anderen Einheiten des Netzes ändert;funktionales Koppeln von Agenten mit einer oder mehreren der mindestens einen Netzwerkkontrolleinheit; undFiltern oder Markieren von an die mindestens eine Netzwerckontrolleinheit gesendeten Mitteilungen, wobei die Mitteilungen von den Agenten gemäß einer jeweiligen Kontrolleinheitsrichtliniendatei gefiltert oder markiert werden, die von einem künstlichen Intelligenzknoten generiert wird, der verschiedene Funktionspunkte und Einheiten des Verkehrsnetzes überwacht.
- Das Verfahren zum Verwalten eines Schienenverkehrsnetzes nach Anspruch 8, das ferner das ständige Aktualisieren der Einheitenrichtliniendateien auf der Grundlage einer weiteren Überwachung von Funktionspunkten oder von alten und neuen Einheiten des Verkehrsnetzes umfasst.
- Das Verfahren zum Verwalten eines Schienenverkehrsnetzes nach Anspruch 8, das ferner das Bereitstellen von Informationen zum Verhalten der Einheit an einen Verhaltensüberwachungsserver umfasst, wobei die bereitgestellten Informationen zum Verhalten der Einheit mindestens ein Ergebnis eines Vergleichs zwischen einer Kommunikationsvorschrift der Einheit in der von dem Knoten für künstliche Intelligenz generierten Einheitsrichtliniendatei und dem in Echtzeit überwachten Kommunikationsverhalten dieser Einheit umfassen.
- Das Verfahren zum Verwalten eines Schienenverkehrsnetzes nach Anspruch 10, das ferner das Schützen von Verwaltungseinheiten vor einer bestimmten Kommunikation umfasst, wenn bei einem Vergleich zwischen einer oder mehreren Eigenschaften der bestimmten Kommunikation und einer oder mehreren Kommunikationsvorschriften der Zieleinheit, an die die bestimmte Kommunikation gesendet wurde, wie in der vom Knoten für künstliche Intelligenz erzeugten Einheitenrichtliniendatei angegeben, eine Nichtübereinstimmung festgestellt wird.
- Das Verfahren zum Verwalten eines Schienenverkehrsnetzes nach Anspruch 11, wobei die eine oder mehreren verglichenen Merkmale der gegebenen Kommunikation Folgendes umfassen: (1) den Sendezeitpunkt der Kommunikation, (2) den Ankunftszeitpunkt der Kommunikation oder (3) spezifische Daten, die als Teil der Kommunikation gesendet werden.
- Das Verfahren zum Verwalten eines Schienenverkehrsnetzes nach Anspruch 8, das ferner umfasst, dass zumindest teilweise Signale oder Datenströme, die von Funktionspunkten und Einheiten des Verkehrsnetzes während vorheriger Verkehrsnetzbetriebszeiten gesammelt wurden, die als frei von Cyber- oder böswilligen Ereignissen ermittelt wurden, als Trainingsdaten für den künstlichen Intelligenz-Knoten, der die Steuereinheitsrichtliniendatei generiert, einbezogen werden.
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201862654558P | 2018-04-09 | 2018-04-09 | |
| US201862668825P | 2018-05-09 | 2018-05-09 | |
| US201862679991P | 2018-06-04 | 2018-06-04 | |
| US201862730559P | 2018-09-13 | 2018-09-13 | |
| PCT/IB2019/052916 WO2019197989A1 (en) | 2018-04-09 | 2019-04-09 | Methods systems devices circuits and functionally related machine executable instructions for transportation management network cybersecurity |
| EP19785702.2A EP3776559B1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
Related Parent Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP19785702.2A Division EP3776559B1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
| EP19785702.2A Division-Into EP3776559B1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| EP4050502A1 EP4050502A1 (de) | 2022-08-31 |
| EP4050502B1 true EP4050502B1 (de) | 2025-12-03 |
| EP4050502C0 EP4050502C0 (de) | 2025-12-03 |
Family
ID=66334168
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP19785702.2A Active EP3776559B1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
| EP22168075.4A Active EP4050502B1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
| EP19168268.1A Withdrawn EP3553682A1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP19785702.2A Active EP3776559B1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP19168268.1A Withdrawn EP3553682A1 (de) | 2018-04-09 | 2019-04-09 | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks |
Country Status (3)
| Country | Link |
|---|---|
| US (3) | US11318969B2 (de) |
| EP (3) | EP3776559B1 (de) |
| WO (1) | WO2019197989A1 (de) |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10944724B2 (en) * | 2018-03-28 | 2021-03-09 | Fortinet, Inc. | Accelerating computer network policy search |
| WO2019197989A1 (en) * | 2018-04-09 | 2019-10-17 | Cervello Ltd. | Methods systems devices circuits and functionally related machine executable instructions for transportation management network cybersecurity |
| AU2018423506B2 (en) | 2018-05-15 | 2021-02-25 | Cylus Cyber Security Ltd. | Railway cyber security systems |
| US20190385090A1 (en) * | 2018-06-14 | 2019-12-19 | Honeywell International Inc. | Systems and methods for using artificial intelligence models to identify a current threat scenario |
| IT201800010349A1 (it) * | 2018-11-15 | 2020-05-15 | Faiveley Transport Italia Spa | Sistema di controllo elettronico della frenatura di un veicolo ferroviario |
| EP3921988B1 (de) * | 2019-02-06 | 2023-05-10 | Telefonaktiebolaget LM Ericsson (publ) | Detektion von kurzen angriffen auf verbundene fahrzeuge |
| US11332175B2 (en) | 2019-05-16 | 2022-05-17 | Cylus Cyber Security Ltd. | Self organizing Cyber Rail-COP |
| WO2021084542A1 (en) * | 2019-10-30 | 2021-05-06 | Cylus Cyber Security Ltd. | Balise integrity |
| CN113581257B (zh) * | 2020-04-30 | 2022-09-09 | 比亚迪股份有限公司 | 信息监控方法、装置、存储介质及电子设备 |
| JP2021185350A (ja) * | 2020-05-25 | 2021-12-09 | ソニーセミコンダクタソリューションズ株式会社 | 信号処理装置、および信号処理方法、並びにプログラム |
| DE102020208955A1 (de) * | 2020-07-17 | 2022-01-20 | Siemens Mobility GmbH | Verfahren zum Überwachen eines Gefahrenraumes und Überwachungsvorrichtung |
| CN112429017B (zh) * | 2020-11-10 | 2022-01-28 | 卡斯柯信号有限公司 | 基于单列车自动防护的区域控制器内列车联挂控制方法 |
| CN117413269A (zh) * | 2021-06-04 | 2024-01-16 | 华为技术有限公司 | 一种数据保护方法及车辆 |
| EP4101727A1 (de) * | 2021-06-11 | 2022-12-14 | ALSTOM Transport Technologies | Steuergerät für einintelligentes objekt für eisenbahnschienen |
| US20230007046A1 (en) * | 2021-06-30 | 2023-01-05 | Cervello Ltd | Methods Systems Devices Circuits and Functionally Related Machine Executable Instructions for Operational Commands Based Cybersecurity of a transportation Management Network |
| CN115963801B (zh) * | 2023-03-16 | 2023-05-23 | 山东科技大学 | 一种基于信息物理融合的机车协同运输调度系统构建方法 |
| CN116367079B (zh) * | 2023-05-30 | 2023-08-18 | 北京全路通信信号研究设计院集团有限公司 | 一种行车许可信息传输方法、装置、设备及存储介质 |
| CN118722798B (zh) * | 2024-05-16 | 2024-12-13 | 中国铁道科学研究院集团有限公司 | 一种高速铁路的无线闭塞中心命令控制系统 |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AUPS241002A0 (en) * | 2002-05-20 | 2002-06-13 | Tmg International Holdings Pty Limited | Scheduling method and system for rail networks |
| US7019637B1 (en) * | 2003-03-28 | 2006-03-28 | Sandia National Laboratories | Systems and methods for detecting and processing |
| US7246156B2 (en) * | 2003-06-09 | 2007-07-17 | Industrial Defender, Inc. | Method and computer program product for monitoring an industrial network |
| US7983835B2 (en) * | 2004-11-03 | 2011-07-19 | Lagassey Paul J | Modular intelligent transportation system |
| NO327319B1 (no) * | 2007-02-15 | 2009-06-08 | Epsis As | Data handling system |
| US20090079560A1 (en) * | 2007-09-26 | 2009-03-26 | General Electric Company | Remotely monitoring railroad equipment using network protocols |
| US9718487B2 (en) * | 2014-02-18 | 2017-08-01 | Nabil N. Ghaly | Method and apparatus for a train control system |
| US9380068B2 (en) | 2014-08-18 | 2016-06-28 | Bank Of America Corporation | Modification of computing resource behavior based on aggregated monitoring information |
| EP3151152B1 (de) | 2015-09-30 | 2020-04-08 | Secure-Nok AS | Nicht-intrusiver softwareagent zur überwachung und erkennung von cyber-sicherheitsereignissen und cyber-angriffen in einem industriellen steuersystem |
| US10501102B2 (en) * | 2017-02-06 | 2019-12-10 | Avante International Technology, Inc. | Positive train control system and apparatus employing RFID devices |
| US11323884B2 (en) * | 2017-06-27 | 2022-05-03 | Allot Ltd. | System, device, and method of detecting, mitigating and isolating a signaling storm |
| WO2019197989A1 (en) * | 2018-04-09 | 2019-10-17 | Cervello Ltd. | Methods systems devices circuits and functionally related machine executable instructions for transportation management network cybersecurity |
| AU2018423506B2 (en) * | 2018-05-15 | 2021-02-25 | Cylus Cyber Security Ltd. | Railway cyber security systems |
| US11332175B2 (en) * | 2019-05-16 | 2022-05-17 | Cylus Cyber Security Ltd. | Self organizing Cyber Rail-COP |
-
2019
- 2019-04-09 WO PCT/IB2019/052916 patent/WO2019197989A1/en not_active Ceased
- 2019-04-09 US US16/378,861 patent/US11318969B2/en active Active
- 2019-04-09 EP EP19785702.2A patent/EP3776559B1/de active Active
- 2019-04-09 US US16/378,889 patent/US11247706B2/en active Active
- 2019-04-09 EP EP22168075.4A patent/EP4050502B1/de active Active
- 2019-04-09 EP EP19168268.1A patent/EP3553682A1/de not_active Withdrawn
-
2021
- 2021-12-30 US US17/646,489 patent/US11926354B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| EP3776559A1 (de) | 2021-02-17 |
| EP4050502A1 (de) | 2022-08-31 |
| WO2019197989A1 (en) | 2019-10-17 |
| US20190312781A1 (en) | 2019-10-10 |
| US20220126895A1 (en) | 2022-04-28 |
| EP4050502C0 (de) | 2025-12-03 |
| US20190308646A1 (en) | 2019-10-10 |
| EP3553682A1 (de) | 2019-10-16 |
| EP3776559C0 (de) | 2023-08-30 |
| US11318969B2 (en) | 2022-05-03 |
| US11926354B2 (en) | 2024-03-12 |
| EP3776559A4 (de) | 2022-03-02 |
| US11247706B2 (en) | 2022-02-15 |
| EP3776559B1 (de) | 2023-08-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP4050502B1 (de) | Verfahren, systeme, vorrichtungen, schaltkreise und funktionsbezogene maschinenausführbare anweisungen für die cybersicherheit eines transportmanagementnetzwerks | |
| US11502999B2 (en) | Cyber security anonymizer | |
| Yu et al. | Security of railway control systems: A survey, research issues and challenges | |
| AU2020376035B2 (en) | Balise integrity | |
| Wang et al. | A resilience-based security assessment approach for railway signalling systems | |
| US20220055671A1 (en) | Self organizing cyber rail-cop | |
| Fakhereldine et al. | Detecting intrusions in communication-based train control systems | |
| Sedjelmaci et al. | Cooperative security framework for CBTC network | |
| Cheh et al. | Determining tolerable attack surfaces that preserves safety of cyber-physical systems | |
| Carlson et al. | Railway security issues: A survey of developing railway technology | |
| Kolli et al. | Positive train control security: An intrusion-detection system to provide cyber-situational awareness | |
| US20230007046A1 (en) | Methods Systems Devices Circuits and Functionally Related Machine Executable Instructions for Operational Commands Based Cybersecurity of a transportation Management Network | |
| Sun et al. | A review of research on the security of train control networks | |
| Hartong et al. | Securing positive train control systems | |
| Korpimäki | Cybersecurity and Risk Management in Implementing Future Railway Mobile Communications System | |
| Fakhereldine | Security of Communication-Based Train Control Systems | |
| Model et al. | Analysis of Attack Actions on the | |
| Park | Cyber-attack vulnerability analysis of communication based train control | |
| Yu et al. | High-speed Railway | |
| Hartong et al. | Security and Dependability in Train Control Systems | |
| SS-CCS-RP | Securing Control and Communications Systems in Transit Environments |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
| AC | Divisional application: reference to earlier application |
Ref document number: 3776559 Country of ref document: EP Kind code of ref document: P |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
| 17P | Request for examination filed |
Effective date: 20221102 |
|
| RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 41/0894 20220101ALI20250515BHEP Ipc: H04L 9/40 20220101ALI20250515BHEP Ipc: H04L 41/28 20220101ALI20250515BHEP Ipc: G06F 21/57 20130101ALI20250515BHEP Ipc: G06F 21/50 20130101ALI20250515BHEP Ipc: G06F 21/00 20130101AFI20250515BHEP |
|
| INTG | Intention to grant announced |
Effective date: 20250523 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
| AC | Divisional application: reference to earlier application |
Ref document number: 3776559 Country of ref document: EP Kind code of ref document: P |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: F10 Free format text: ST27 STATUS EVENT CODE: U-0-0-F10-F00 (AS PROVIDED BY THE NATIONAL OFFICE) Effective date: 20251203 Ref country code: GB Ref legal event code: FG4D |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602019078933 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
| U01 | Request for unitary effect filed |
Effective date: 20251230 |
|
| U07 | Unitary effect registered |
Designated state(s): AT BE BG DE DK EE FI FR IT LT LU LV MT NL PT RO SE SI Effective date: 20260123 |